Microsoft
Microsoft Logo

Describe the basic concepts of cybersecurity 

  • Offered byMicrosoft

Describe the basic concepts of cybersecurity
 at 
Microsoft 
Overview

Duration

2 hours

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Describe the basic concepts of cybersecurity
Table of content
Accordion Icon V3
  • Overview
  • Course Details
  • Curriculum
  • Entry Requirements
Details Icon

Describe the basic concepts of cybersecurity
 at 
Microsoft 
Course details

What are the course deliverables?
  • Describe basic cybersecurity threats, attacks, and mitigations
  • Describe concepts of cryptography
  • Describe authentication and authorization in cybersecurity
  • Describe network-based threats and mitigations
  • Describe device-based threats and security controls
  • Describe application-based threats and how to protect against them
More about this course
  • In this learning path you will learn about cybersecurity concepts and ways to protect yourself and your business from cyberattacks
  • Throughout this course you learn about the different elements of cryptography and their application in cybersecurity
  • Learn about common identity-based attacks, different authentication methods, and ways to protect against unauthorized access

Describe the basic concepts of cybersecurity
 at 
Microsoft 
Curriculum

Describe basic cybersecurity threats, attacks, and mitigations

Introduction

Describe what is cybersecurity

Describe the threat landscape

Describe malware

Describe basic mitigation strategies

Knowledge check

Summary and resources

Describe concepts of cryptography

Introduction

Describe cryptography

Describe encryption and its use in cybersecurity

Describe hashing and its application in digital signing

Describe digital certificates

Knowledge check

Summary and resources

Describe authentication and authorization in cybersecurity

Introduction

Define authentication

Describe authentication-based attacks

Describe authorization security techniques

Knowledge check

Summary and resources

Describe network-based threats and mitigations

Introduction

Describe the different types of networks

Describe how data moves around a network

Describe threats to network security

Protect your network

Knowledge check

Summary and resources

Describe device-based threats and security controls

Introduction

Describe what your device knows about you

Describe how devices become cybersecurity threats

Describe how to mitigate against device-related threats

Knowledge check

Summary and resources

Describe application-based threats and how to protect against them

Introduction

Describe what are applications

Describe the threat landscape of applications

Describe how to protect your applications

Knowledge check

Summary and resources

Describe the basic concepts of cybersecurity
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Microsoft

Free
2 hours
Intermediate
Free
1 hours
Beginner
Free
3 hours
Intermediate
Free
14 hours
Beginner
View Other 1171 CoursesRight Arrow Icon
qna

Describe the basic concepts of cybersecurity
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...